Pages

An event which should not be omitted from any timeline of computing history actually predates the computer by over fifty years.

Pictured Above: Marconi and associates raising the receiving antenna by kite at St. John's, Newfoundland in December, 1901. Image Public Domain.

In the early 1900's an Italian physicist named Guglielmo Marconi created a "wireless telegraph" which according to Marconi's claims could be tuned to broadcast on a "precise wavelength" in order to setup "confidential channels".

Marconi's invention severely threatened the wired telegraph industry. In response the Eastern Telegraph Company hired John Nevil Maskelyne, a British magician and inventor, who had experimented with wireless technologies such as spark-gap transmitters, to monitor Marconi's work.

Pictured Above: John Nevil Maskelyne. Image Public Domain.

Maskelyne was able to construct broadband receivers capable of intercepting Marconi's "secure" transmissions without knowing their transmission frequency. Then Maskelyne took things one step further to help discredit Marconi's claims.

In June of 1903 Marconi had setup a demonstration in London which would receive a message from a clifftop station 300 miles away. However, before he could transmit the message, Maskelyne sent a message of his own to Marconi's receiver.

Rats rats rats rats. There was a young fellow of Italy, who diddled the public quite prettily...

The message went on to further mock and insult Marconi. In the process, this "hack" revealed that Marconi's telegraph was not as secure as he had claimed, and that if someone else could transmit messages to his receiver, nothing would prevent them from intercepting the messages as well.

Several days later a letter from Maskelyne was published by The Times. In the letter Maskelyne confessed to be the person responsible for transmitting the message received by Marconi's instruments, and stated that he did so to demonstrate its security flaws.

Computer security is a necessary evil. Think how much simpler our lives would be if everyone could be trustworthy - you wouldn't have to remember long complicated passwords, or worry about making sure your antivirus and security patches are up to date on your computer. Unfortunately the fact of the matter is that not everyone can be trusted, and there are some out there who have malicious intentions as well as the capability to leverage those intentions.

To understand where we are going, first we need to understand where we have been, and why we are where we are today. Technology is always evolving. Sometimes with this evolution, new security flaws are created as systems become more complex. In these following pages I will attempt to remain as non-technical as possible, providing the reader an overview of the issues without boring them to death with the technical details. I will always include reference material where the reader can obtain additional technical information if they so desire.

I have personally been involved with some of the "evolution of computing security", and when possible will happily share my personal experiences. Hopefully I can have others who have been involved share their experiences as well. It really has been a long, crazy trip. But before we can get to some personal accounts, we'll need to turn the clock back to far before the computing age, in order to understand that some issues, such as confidentiality of transmitted messages, have been a problem long before the first computer was ever built.